cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,247Updated 3 weeks ago
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β559Updated this week
- π A curated list of awesome Docker security resourcesβ699Updated 3 weeks ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,184Updated 2 months ago
- β572Updated 3 years ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,171Updated last year
- Automating situational awareness for cloud penetration tests.β2,254Updated last month
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.β1,569Updated 3 years ago
- NMAP Vulnerability Scanning Scriptsβ627Updated 3 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β1,030Updated 5 months ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web servicesβ488Updated 2 years ago
- Checklist for container security - devsecops practicesβ1,605Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloudβ2,211Updated this week
- all paths lead to cloudsβ638Updated 2 years ago
- Automated Red Team Infrastructure deployement using Dockerβ1,255Updated 3 years ago
- My cheatsheet notes to pentest AWS infrastructureβ696Updated 3 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,735Updated 2 years ago
- π¦π Awesome list of secrets in environment variables π₯οΈβ899Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRsβ1,197Updated 7 months ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,311Updated last year
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secuβ¦β1,054Updated last week
- DNSTake β A fast tool to check missing hosted DNS zones that can lead to subdomain takeoverβ851Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,472Updated 3 years ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assetsβ823Updated 8 months ago
- A DFIR tool written in Python.β1,052Updated 4 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,019Updated 11 months ago
- A curated list of awesome CI CD security resourcesβ794Updated 2 months ago
- Detector for Log4Shell exploitation attemptsβ730Updated 3 years ago
- A Blazing fast Security Auditing tool for Kubernetesβ1,006Updated last year
- An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmβ¦β765Updated last year
- Open Source Package Analysisβ857Updated 7 months ago